Remove cyber-risk tips-for-securing-the-software-supply-chain
article thumbnail

Ofcom Becomes the Latest Victim of MOVEit Supply Chain Attack

IT Governance

The UK’s broadcasting regulator, Ofcom, has revealed that it’s among the organisations whose data has been stolen in the massive MOVEit cyber attack. This is the latest in a series of cyber attacks exploiting a critical flaw in Progress Software’s MOVEit file transfer tool, which is used by thousands of organisations and as many as 3.5

article thumbnail

Free Expert Insights

IT Governance

Here are all our Q&As to date, grouped by broad topic: AI Cyber attacks and data breaches Cyber Essentials Cyber resilience Cyber security Data privacy DORA Incident response ISO 27001 PCI DSS PECR Security testing Training Miscellaneous To get new expert insights straight to your inbox, sign up to our weekly newsletter, the Security Spotlight.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

When supply chain attacks start impacting everyone’s daily life, it becomes very real for us all. As an enterprise security team, you could restrict internet access at your egress points, but this doesn’t do much when the workforce is remote. Back up your data and secure your backups in an offline location.

Access 227
article thumbnail

US Agencies and FireEye were hacked with a supply chain attack on SolarWinds Software

Security Affairs

The cyber espionage group has tampered with updates released by IT company SolarWinds, which provides its products to government agencies, military, and intelligence offices, two people familiar with the matter told the Reuters agency. . Threat actors carried out a highly-sophisticated supply chain attack.

Military 127
article thumbnail

The 14 Cloud Security Principles explained

IT Governance

Cloud security is an essential part of today’s cyber security landscape. But whenever organisations adopt technological solutions such as this, they must acknowledge the risks that come with it. This might include spotting misconfigured firewalls or physical security threats. Data in transit protection.

Cloud 126
article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

Application security is the practice of securing software and data from hackers, whether that application comes from a third party or was developed in house, regardless of where it resides or how it’s accessed. How Does Application Security Work? What Are the Types of Application Security?

article thumbnail

MY TAKE: Android users beware: Google says ‘potentially harmful apps’ on the rise

The Last Watchdog

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital Our smartphones. Instead of having to trick users one by one, fraudsters only have to deceive the device manufacturer, or some other party involved in the supply chain, and thereby get their malicious code delivered far and wide.